chico no me está pareciendo un problema tuyo, te palo con ESA rss nada
más o con todas?

Thread name: "Re: [Gutl-l] Error en squid" 
Mail number: 3 
Date: Thu, Feb 12, 2015 
In reply to: Maikel Nieves Matamoros 
>
> > -----Mensaje original-----
> > De: gutl-l-boun...@jovenclub.cu [mailto:gutl-l-boun...@jovenclub.cu] En
> > nombre de låzaro
> > Enviado el: jueves, 12 de febrero de 2015 03:44 p.m.
> > Para: Lista cubana de soporte técnico en Tecnologias Libres
> > Asunto: Re: [Gutl-l] Error en squid
> > 
> > corre el siguiente comando y pega el resultado
> > 
> > cat /etc/squid/*|grep deny
> > 
> > 
> > Thread name: "[Gutl-l]  Error en squid"
> > Mail number: 1
> > Date: Thu, Feb 12, 2015
> > In reply to: Maikel Nieves Matamoros
> > >
> > > Amigos al analizar el access.log veo un error como este:
> > >
> > > 1423756580.273      0 172.31.1.34 TCP_DENIED/407 4750 GET
> > > http://www.juventudrebelde.cu/get/rss/grupo/generales/ - NONE/-
> > > text/html
> > >
> > > Realmente no entiendo…primera vez que veo este error….alguna 
> > > sugerencia????
> > >
> > > Saludos….
> > >
> > >
> > > --
> > > Este mensaje ha sido analizado por MailScanner en busca de virus y
> > > otros contenidos peligrosos, y se considera que está limpio.
> > >
> > > ------------ próxima parte ------------ Se ha borrado un adjunto en
> > > formato HTML...
> > > URL:
> > > <http://listas.jovenclub.cu/pipermail/gutl-l/attachments/20150212/e323
> > > fb83/attachment.html>
> > > ______________________________________________________________________
> > > Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
> > > Gutl-l@jovenclub.cu
> > > https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l
> > 
> > --
> > -------- Warning! ------------
> > 100'000 pelos de escoba fueron
> > introducidos satisfactoriamente
> > en su puerto USB.
> > 
> > 
> > 
> > 
> > A continuación, la firma de una herramienta inútil:
> > 
> > --
> > Este mensaje ha sido analizado por MailScanner
> > en busca de virus y otros contenidos peligrosos,
> > y se considera que est  limpio.
> 
> 
> Así quedó.....
> 
> #denyusers    /usr/local/squid/etc/msntauth.denyusers
> #       # cache_peer_access mycache_mydomain.net deny all
> #       # If -s is specified the limit is strict, denying browsing
> #       # -s Squid will just annoy the user by "randomly" denying requests.
> # follow_x_forwarded_for deny all
> #     http_access allow|deny [!]aclname ...
> #     If there are no "access" lines present, the default is to deny
> #     deny, the default is allow.  Conversely, if the last line
> #     is allow, the default will be deny.  For these reasons, it is a
> #     good idea to have an "deny all" entry at the end of your access
> # http_access deny all
> http_access deny manager
> http_access deny !Safe_ports
> http_access deny CONNECT !SSL_ports
> #http_access deny to_localhost
> # And finally deny all other access to this proxy
> http_access deny all
> #     http_reply_access allow|deny [!] aclname ...
> #     with an "allow all" or "deny all" entry.
> #     icp_access  allow|deny [!]aclname ...
> ##icp_access deny all
> # icp_access deny all
> #     htcp_access  allow|deny [!]aclname ...
> #     deny all traffic. This default may cause problems with peers
> ##htcp_access deny all
> # htcp_access deny all
> #     htcp_clr_access  allow|deny [!]aclname ...
> # htcp_clr_access deny all
> #             miss_access deny  !localclients
> #     ident_lookup_access deny all
> # ident_lookup_access deny all
> #     http_access deny ipv6 !all
> #     ssl_bump deny localhost
> #     ssl_bump deny broken_sites
> #             sslproxy_cert_error deny all
> #     Default setting:  sslproxy_cert_error deny all
> #                     For example to deny peer usage on requests from peer
> #                     by denying cache_peer_access if the source is a peer.
> #     cache_peer_access cache-host allow|deny [!]aclname ...
> #  TAG: log_access    allow|deny acl acl...
> #     You must use the words 'allow' or 'deny' to indicate whether items
> #     Squid defaults to deny GET and HEAD requests with request entities,
> #     Usage: request_header_access header_name allow|deny [!]aclname ...
> #             request_header_access From deny all
> #             request_header_access Referer deny all
> #             request_header_access Server deny all
> #             request_header_access User-Agent deny all
> #             request_header_access WWW-Authenticate deny all
> #             request_header_access Link deny all
> #             request_header_access All deny all
> #     Usage: reply_header_access header_name allow|deny [!]aclname ...
> #             reply_header_access From deny all
> #             reply_header_access Referer deny all
> #             reply_header_access Server deny all
> #             reply_header_access User-Agent deny all
> #             reply_header_access WWW-Authenticate deny all
> #             reply_header_access Link deny all
> #             reply_header_access All deny all
> # delay_access 1 deny all
> # delay_access 2 deny all
> #     Allowing or denying access to the SNMP port.
> #     snmp_access allow|deny [!]aclname ...
> # snmp_access deny all
> # snmp_access deny all
> #  TAG: deny_info
> #     Usage:   deny_info err_page_name acl
> #     or       deny_info http://... acl
> #     or       deny_info TCP_RESET acl
> #     acl it evaluated in http_access, and if a 'deny_info' line exists
> #     The acl is typically the last acl on the http_access deny line which
> #         Example: deny_info ERR_CUSTOM_ACCESS_DENIED bad_guys
> #     Usage: always_direct allow|deny [!]aclname ...
> #     'never_direct'.  You need to be aware that "always_direct deny
> #     may need to use a deny rule to exclude a more-specific case of
> #             always_direct deny local-external
> #     Usage: never_direct allow|deny [!]aclname ...
> #             never_direct deny local-servers
> #             always_direct deny local-external
> #     adaptation_access service_name allow|deny [!]aclname...
> #     adaptation_access set_name     allow|deny [!]aclname...
> #     adaptation service is used for the transaction. For a "deny"
> #     icap_retry allow|deny [!]aclname ...
> # icap_retry deny all
> #     deny:   The request is denied.  The user receives an "Invalid
> #       # cache_peer_access mycache_mydomain.net deny all
> #       # If -s is specified the limit is strict, denying browsing
> #       # -s Squid will just annoy the user by "randomly" denying requests.
> # follow_x_forwarded_for deny all
> #     http_access allow|deny [!]aclname ...
> #     If there are no "access" lines present, the default is to deny
> #     deny, the default is allow.  Conversely, if the last line
> #     is allow, the default will be deny.  For these reasons, it is a
> #     good idea to have an "deny all" entry at the end of your access
> # http_access deny all
> http_access deny manager
> http_access deny !Safe_ports
> http_access deny CONNECT !SSL_ports
> #http_access deny to_localhost
> # And finally deny all other access to this proxy
> http_access deny all
> #     http_reply_access allow|deny [!] aclname ...
> #     with an "allow all" or "deny all" entry.
> #     icp_access  allow|deny [!]aclname ...
> ##icp_access deny all
> # icp_access deny all
> #     htcp_access  allow|deny [!]aclname ...
> #     deny all traffic. This default may cause problems with peers
> ##htcp_access deny all
> # htcp_access deny all
> #     htcp_clr_access  allow|deny [!]aclname ...
> # htcp_clr_access deny all
> #             miss_access deny  !localclients
> #     ident_lookup_access deny all
> # ident_lookup_access deny all
> #     http_access deny ipv6 !all
> #     ssl_bump deny localhost
> #     ssl_bump deny broken_sites
> #             sslproxy_cert_error deny all
> #     Default setting:  sslproxy_cert_error deny all
> #                     For example to deny peer usage on requests from peer
> #                     by denying cache_peer_access if the source is a peer.
> #     cache_peer_access cache-host allow|deny [!]aclname ...
> #  TAG: log_access    allow|deny acl acl...
> #     You must use the words 'allow' or 'deny' to indicate whether items
> #     Squid defaults to deny GET and HEAD requests with request entities,
> #     Usage: request_header_access header_name allow|deny [!]aclname ...
> #             request_header_access From deny all
> #             request_header_access Referer deny all
> #             request_header_access Server deny all
> #             request_header_access User-Agent deny all
> #             request_header_access WWW-Authenticate deny all
> #             request_header_access Link deny all
> #             request_header_access All deny all
> #     Usage: reply_header_access header_name allow|deny [!]aclname ...
> #             reply_header_access From deny all
> #             reply_header_access Referer deny all
> #             reply_header_access Server deny all
> #             reply_header_access User-Agent deny all
> #             reply_header_access WWW-Authenticate deny all
> #             reply_header_access Link deny all
> #             reply_header_access All deny all
> # delay_access 1 deny all
> # delay_access 2 deny all
> #     Allowing or denying access to the SNMP port.
> #     snmp_access allow|deny [!]aclname ...
> # snmp_access deny all
> # snmp_access deny all
> #  TAG: deny_info
> #     Usage:   deny_info err_page_name acl
> #     or       deny_info http://... acl
> #     or       deny_info TCP_RESET acl
> #     acl it evaluated in http_access, and if a 'deny_info' line exists
> #     The acl is typically the last acl on the http_access deny line which
> #         Example: deny_info ERR_CUSTOM_ACCESS_DENIED bad_guys
> #     Usage: always_direct allow|deny [!]aclname ...
> #     'never_direct'.  You need to be aware that "always_direct deny
> #     may need to use a deny rule to exclude a more-specific case of
> #             always_direct deny local-external
> #     Usage: never_direct allow|deny [!]aclname ...
> #             never_direct deny local-servers
> #             always_direct deny local-external
> #     adaptation_access service_name allow|deny [!]aclname...
> #     adaptation_access set_name     allow|deny [!]aclname...
> #     adaptation service is used for the transaction. For a "deny"
> #     icap_retry allow|deny [!]aclname ...
> # icap_retry deny all
> #     deny:   The request is denied.  The user receives an "Invalid
> 
> 
> 
> -- 
> Este mensaje ha sido analizado por MailScanner
> en busca de virus y otros contenidos peligrosos,
> y se considera que est? limpio.
> 

> ______________________________________________________________________
> Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
> Gutl-l@jovenclub.cu
> https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l


-- 
-------- Warning! ------------
100'000 pelos de escoba fueron
introducidos satisfactoriamente
en su puerto USB.




A continuación, la firma de una herramienta inútil:

-- 
Este mensaje ha sido analizado por MailScanner
en busca de virus y otros contenidos peligrosos,
y se considera que est� limpio.

______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Responder a